Tag Archives: engineering

Social Engineering Attack – Breach of Trust

There is an alarming increase in cases of unknown individuals winning the trust of unsuspecting victims in the virtual world and then misusing this trust to commit crimes on the victims. This is the world of the social engineering attack. It starts with information collection regarding a targeted individual.

 

A college girl in Gujarat was asked her mobile number by a co-student. She refused but the co-student coolly replied that he will get it. Next day he had her name, her fathers’ name, her address and her phone number!! How did he get it? By uploading her “Scooty” number on the RTO site of Gujarat.

 

An Income Tax Department site of the Government of India called “e-filling” is another such target. A cyber criminal provides the surname of a person and his date of birth – he can get the PAN card number of a targeted individual. Using this number and a

Read more at: http://morungexpress.com/social-engineering-attack-breach-trust/

Social Engineering Attack – Breach of Trust

There is an alarming increase in cases of unknown individuals winning the trust of unsuspecting victims in the virtual world and then misusing this trust to commit crimes on the victims. This is the world of the social engineering attack. It starts with information collection regarding a targeted individual.

 

A college girl in Gujarat was asked her mobile number by a co-student. She refused but the co-student coolly replied that he will get it. Next day he had her name, her fathers’ name, her address and her phone number!! How did he get it? By uploading her “Scooty” number on the RTO site of Gujarat.

 

An Income Tax Department site of the Government of India called “e-filling” is another such target. A cyber criminal provides the surname of a person and his date of birth – he can get the PAN card number of a targeted individual. Using this number and a

Read more at: http://morungexpress.com/social-engineering-attack-breach-trust/

Cybersecurity: Are Social Engineering Attacks Covered Under Insurance Policies?

Cybersecurity incidents are a popular topic of coverage in the press. These incidents range from hacking into organizations that hold a large quantity of data about clients, employees, vendors and other stakeholders to duping employees to transfer funds into fraudulent bank accounts. Cybersecurity is a top of mind issue for most organizations. From a risk management standpoint, organizations often purchase insurance coverage as a means of mitigating the impacts of a cybersecurity incident. That said, sometimes there is a disconnect between the type of coverage the insured thinks it is getting and what the policy actually covers.

This was a particularly important focus in the decision The Brick Warehouse LP v. Chubb Insurance Company of Canada[1], where the Alberta Court of Queen’s Bench found that a vendor impersonation did not fall within the terms of the plaintiff’s crime policy coverage. The case is

Read more at: https://www.lexology.com/library/detail.aspx?g=f99231d5-3998-4283-89e5-773f052ba8f3